Learn web design, computer maintenance, programming, computer architecture, computer networking, electronics, mathematics, art and graphic design.

The Mechanical Universe

Draw with your finger


Learn more at amazon.com

Processor Interrupts
An interrupt is a signal to the processor indicating an event has occurred that needs immediate attention. When an interrupt occurs, the processors normal path of execution is interrupted in order to run a routine to service the interrupt requester. More ...

How to Check Your PCs TPM
One of the requirements for Windows 11 is TPM version 2.0. If you have Windows 10 and you have TPM version 2.0 module, and it's enabled, then you can install and run Windows 11. More ...

Windows 10 Disable Aero Snap and Shake
With Aero Snap and Shake Windows does what it wants to do, not what you want it to do. More ...

Regular Expression Basics : Match a Set of Characters
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. In this article you'll learn how to use regular expressions to match a set of of characters. More ...

Easy JavaScript FileReader Code
The JavaScript FileReader object allows web pages to read files stored on the user's computer. Files may be selected using the input element, or selected with a drag and drop operation. More ...

Introduction to Operating Systems
An operating system is software that acts as an intermediary between a computer user and the computer's applications and hardware. An operating system can be viewed as a resource allocator. Resources might be CPU time, memory space, file storage space, and input/output (I/O) devices. More ...

IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...

Self-Esteem and Success
A person with high self-esteem believes that they are a worthwhile and important person. A person with low self-esteem believes that others are better than them, and that they deserve to treated badly by others. More ...

Installing IIS on Windows 10
If you want to test your Classic ASP scripts, IIS (Internet Information Services) is a feature that included with every Windows 10 operating system, but it is an option, so you do have to install it first. More ...

Access Useful Laptop Settings in the Windows Mobility Center
Some useful laptop settings are collected together in a group called the Windows Mobility Center. Near the top of the secret menu, select Mobility Center. Here you'll find controls for setting the screen brightness, sound volume, screen orientation, and such. More ...

Easy CSS 3D Mouse-over Pressed Text Effect
I provide easy CSS code for 3d text when you move your mouse pointer over the 3D text shown above, the text will appear to be pressed. In this example, I configured the 3d text in a link. More ...

Regular Expressions Lookarounds
In this article you learn how to match a pattern only when it comes after another pattern (or after not that pattern) or only when it comes before another pattern (or before not that pattern). More ...

Regular Expression Position Matching
In this article you how to use regular expressions to match characters at the beginning, end, both beginning and end, or at any specified location in a string. More ...

A JavaScript Function That Returns a Function
Its a fad now in JavaScript to code functions that return functions in order to avoid declaring global variables but the procedure is inefficient and unnecessary. More ...

Introduction to HTML
A Web server sends the response to the client browser with a set of instructions written in HTML (HyperText Markup Language). HTML consists of tags that define the structure of a web page. It is the standard markup language for documents to be displayed in a web browser. More ...

Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...


See it at amazon.com

Custom Search